| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_cipher.camellia.data | 9 CAMELLIA Encrypt and decrypt 0 bytes [#1] 17 CAMELLIA Encrypt and decrypt 2 bytes [#1] 21 CAMELLIA Encrypt and decrypt 7 bytes [#1] 25 CAMELLIA Encrypt and decrypt 8 bytes [#1] 29 CAMELLIA Encrypt and decrypt 9 bytes [#1] 33 CAMELLIA Encrypt and decrypt 15 bytes [#1] 37 CAMELLIA Encrypt and decrypt 16 bytes [#1] 41 CAMELLIA Encrypt and decrypt 17 bytes [#1] 45 CAMELLIA Encrypt and decrypt 31 bytes [#1] 49 CAMELLIA Encrypt and decrypt 32 bytes [#1] [all …]
|
| A D | test_suite_cipher.des.data | 13 DES Encrypt and decrypt 0 bytes [#1] 21 DES Encrypt and decrypt 2 bytes 25 DES Encrypt and decrypt 7 bytes 29 DES Encrypt and decrypt 8 bytes 33 DES Encrypt and decrypt 9 bytes 37 DES Encrypt and decrypt 15 bytes 41 DES Encrypt and decrypt 16 bytes 45 DES Encrypt and decrypt 17 bytes 49 DES Encrypt and decrypt 31 bytes 61 DES Encrypt and decrypt 47 bytes [all …]
|
| A D | test_suite_bignum_mod_raw.function | 167 TEST_MEMORY_COMPARE(X, bytes, Y, bytes); 300 TEST_MEMORY_COMPARE(X, bytes, res, bytes); 305 TEST_MEMORY_COMPARE(X, bytes, res, bytes); 310 TEST_MEMORY_COMPARE(X, bytes, res, bytes); 423 TEST_MEMORY_COMPARE(X, bytes, R, bytes); 428 TEST_MEMORY_COMPARE(X, bytes, R, bytes); 433 TEST_MEMORY_COMPARE(X, bytes, R, bytes); 581 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 586 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 591 TEST_MEMORY_COMPARE(X, bytes, S, bytes); [all …]
|
| A D | test_suite_cipher.aria.data | 5 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 0 bytes 13 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 2 bytes 17 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 7 bytes 21 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 8 bytes 25 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 9 bytes 29 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 15 bytes 33 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 16 bytes 37 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 17 bytes 41 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 31 bytes 45 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 32 bytes [all …]
|
| A D | test_suite_cipher.null.data | 1 NULL Encrypt and decrypt 0 bytes 5 NULL Encrypt and decrypt 1 bytes 9 NULL Encrypt and decrypt 2 bytes 13 NULL Encrypt and decrypt 7 bytes 17 NULL Encrypt and decrypt 8 bytes 21 NULL Encrypt and decrypt 9 bytes 25 NULL Encrypt and decrypt 15 bytes 29 NULL Encrypt and decrypt 16 bytes 33 NULL Encrypt and decrypt 31 bytes 37 NULL Encrypt and decrypt 32 bytes [all …]
|
| A D | test_suite_cipher.chacha20.data | 9 ChaCha20 Encrypt and decrypt 0 bytes 13 ChaCha20 Encrypt and decrypt 1 bytes 17 ChaCha20 Encrypt and decrypt 2 bytes 21 ChaCha20 Encrypt and decrypt 7 bytes 25 ChaCha20 Encrypt and decrypt 8 bytes 29 ChaCha20 Encrypt and decrypt 9 bytes 33 ChaCha20 Encrypt and decrypt 15 bytes 37 ChaCha20 Encrypt and decrypt 16 bytes 41 ChaCha20 Encrypt and decrypt 17 bytes 45 ChaCha20 Encrypt and decrypt 31 bytes [all …]
|
| A D | test_suite_cipher.aes.data | 377 AES-128 CFB - Encrypt and decrypt 0 bytes 385 AES-128 CFB - Encrypt and decrypt 2 bytes 389 AES-128 CFB - Encrypt and decrypt 7 bytes 393 AES-128 CFB - Encrypt and decrypt 8 bytes 397 AES-128 CFB - Encrypt and decrypt 9 bytes 481 AES-128 OFB - Encrypt and decrypt 0 bytes 489 AES-128 OFB - Encrypt and decrypt 2 bytes 493 AES-128 OFB - Encrypt and decrypt 7 bytes 497 AES-128 OFB - Encrypt and decrypt 8 bytes 501 AES-128 OFB - Encrypt and decrypt 9 bytes [all …]
|
| A D | test_suite_cipher.chachapoly.data | 5 ChaCha20+Poly1305 Encrypt and decrypt 0 bytes 9 ChaCha20+Poly1305 Encrypt and decrypt 1 bytes 13 ChaCha20+Poly1305 Encrypt and decrypt 2 bytes 17 ChaCha20+Poly1305 Encrypt and decrypt 7 bytes 21 ChaCha20+Poly1305 Encrypt and decrypt 8 bytes 25 ChaCha20+Poly1305 Encrypt and decrypt 9 bytes 29 ChaCha20+Poly1305 Encrypt and decrypt 15 bytes 33 ChaCha20+Poly1305 Encrypt and decrypt 16 bytes 37 ChaCha20+Poly1305 Encrypt and decrypt 17 bytes 41 ChaCha20+Poly1305 Encrypt and decrypt 31 bytes [all …]
|
| A D | test_suite_bignum_core.function | 37 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 42 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 47 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 54 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 59 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 65 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 70 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 75 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 114 TEST_MEMORY_COMPARE(X, bytes, A, bytes); 118 TEST_MEMORY_COMPARE(X, bytes, S, bytes); [all …]
|
| A D | test_suite_cipher.padding.data | 68 Check PKCS padding #6 (too few padding bytes) 72 Check PKCS padding #7 (non-uniform padding bytes #1) 76 Check PKCS padding #7 (non-uniform padding bytes #2) 80 Check PKCS padding #7 (non-uniform padding bytes #3) 84 Check PKCS padding #7 (non-uniform padding bytes #4) 88 Check PKCS padding #7 (non-uniform padding bytes #5) 92 Check PKCS padding #7 (non-uniform padding bytes #6) 96 Check PKCS padding #7 (non-uniform padding bytes #7) 100 Check PKCS padding #7 (non-uniform padding bytes #8) 104 Check PKCS padding #7 (non-uniform padding bytes #9) [all …]
|
| A D | test_suite_psa_its.data | 1 Set/get/remove 0 bytes 4 Set/get/remove 42 bytes 7 Set/get/remove 1000 bytes 40 Get 0 bytes of 10 at 10 46 Get 0 bytes of 10 at 0 52 Get 2 bytes of 10 at 1 61 Get 0 bytes of 10 at 11: out of range
|
| A D | test_suite_bignum_mod.function | 131 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 134 memcpy(rX.p, rA.p, bytes); 136 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 141 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 146 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 151 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 156 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 161 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 166 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 302 memcpy(x.p, a.p, bytes); [all …]
|
| A D | test_suite_bignum_core.misc.data | 428 Fill random core: 0 bytes 449 Fill random core: 8 bytes, RNG stops before 452 Fill random core: 8 bytes, RNG just sufficient 455 Fill random core: 8 bytes, RNG not exhausted 461 Fill random core: 8 bytes, 1 extra limb 467 Fill random core: 9 bytes, 1 missing limb 470 Fill random core: 42 bytes, RNG stops before 476 Fill random core: 42 bytes, RNG not exhausted 482 Fill random core: 42 bytes, 1 extra limb 488 Fill random core: 42 bytes, 1 missing limb [all …]
|
| A D | test_suite_asn1parse.data | 64 length=0 (2 length bytes) 73 length=1 (2 length bytes) 76 length=1 (3 length bytes) 79 length=1 (4 length bytes) 88 length=2 (2 length bytes) 91 length=2 (3 length bytes) 94 length=2 (4 length bytes) 103 length=128 (2 length bytes) 109 length=255 (2 length bytes) 112 length=256 (2 length bytes) [all …]
|
| A D | test_suite_psa_crypto_driver_wrappers.data | 358 PSA symmetric decrypt: AES-CTR, 16 bytes, good 366 PSA symmetric decrypt: AES-CTR, 16 bytes, fake 458 PSA AEAD encrypt: AES-CCM, 24 bytes 462 PSA AEAD encrypt: AES-CCM, 24 bytes, fallback 470 PSA AEAD encrypt, AES-GCM, 128 bytes #1 474 PSA AEAD encrypt, AES-GCM, 128 bytes #1, fallback 482 PSA AEAD decrypt: AES-CCM, 39 bytes 486 PSA AEAD decrypt: AES-CCM, 39 bytes, fallback 494 PSA AEAD decrypt, AES-GCM, 144 bytes #1 800 PSA AEAD encrypt setup, AES-GCM, 128 bytes #1 [all …]
|
| A D | test_suite_lms.data | 18 # word at the start of the key/sig. We strip these 4 bytes from the signature 22 # signature bytes will differ due to randomization): 32 # message1 = bytes.fromhex('60da1a17c88c59da8a730e6ca8effd37') 43 # signature bytes will differ due to randomization), after generating the 62 # signature bytes will differ due to randomization): 94 # signature bytes will differ due to randomization): 122 # signature bytes will differ due to randomization): 146 # signature bytes will differ due to randomization): 157 # message = bytes.fromhex('60da1a17c88c59da8a730e6ca8effd37') 169 # signature bytes will differ due to randomization): [all …]
|
| A D | test_suite_psa_crypto.data | 7 PSA import/export raw: 1 bytes 10 PSA import/export raw: 1 bytes, larger buffer 13 PSA import/export raw: 2 bytes, buffer too small 28 PSA import/export raw: 1 bytes, opaque 2810 PSA AEAD encrypt: AES-CCM, 23 bytes 6321 # output key test: secret passed as bytes, other secret passed as bytes 7344 PSA generate random: 0 bytes 7350 PSA generate random: 4 bytes 7353 PSA generate random: 16 bytes 7356 PSA generate random: 19 bytes [all …]
|
| A D | test_suite_cipher.gcm.data | 13 AES 128 GCM Encrypt and decrypt 0 bytes 21 AES 128 GCM Encrypt and decrypt 2 bytes 25 AES 128 GCM Encrypt and decrypt 7 bytes 29 AES 128 GCM Encrypt and decrypt 8 bytes 33 AES 128 GCM Encrypt and decrypt 9 bytes 37 AES 128 GCM Encrypt and decrypt 15 bytes 41 AES 128 GCM Encrypt and decrypt 16 bytes 45 AES 128 GCM Encrypt and decrypt 17 bytes 49 AES 128 GCM Encrypt and decrypt 31 bytes 61 AES 128 GCM Encrypt and decrypt 47 bytes [all …]
|
| /lib/mbedtls/external/mbedtls/scripts/mbedtls_dev/ |
| A D | psa_storage.py | 109 material: bytes #pylint: disable=used-before-assignment argument 127 ) -> bytes: #pylint: disable=used-before-assignment 141 def bytes(self) -> bytes: member in Key 168 return self.bytes().hex() 186 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex)) 197 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex)) 205 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex))
|
| A D | asymmetric_key_data.py | 16 def unhexlify(text: str) -> bytes: 19 def construct_asymmetric_key_data(src) -> Dict[str, Dict[int, bytes]]:
|
| /lib/libavb/ |
| A D | avb_util.c | 40 uint8_t bytes[4]; in avb_htobe32() member 42 ret.bytes[0] = (in >> 24) & 0xff; in avb_htobe32() 43 ret.bytes[1] = (in >> 16) & 0xff; in avb_htobe32() 44 ret.bytes[2] = (in >> 8) & 0xff; in avb_htobe32() 45 ret.bytes[3] = in & 0xff; in avb_htobe32() 53 uint8_t bytes[8]; in avb_htobe64() member 55 ret.bytes[0] = (in >> 56) & 0xff; in avb_htobe64() 56 ret.bytes[1] = (in >> 48) & 0xff; in avb_htobe64() 57 ret.bytes[2] = (in >> 40) & 0xff; in avb_htobe64() 61 ret.bytes[6] = (in >> 8) & 0xff; in avb_htobe64() [all …]
|
| /lib/mbedtls/external/mbedtls/docs/architecture/ |
| A D | mbed-crypto-storage-specification.md | 55 * magic (8 bytes): `"PSA\0KEY\0"` 56 * version (4 bytes): 0 60 * key material length (4 bytes) 206 * version (4 bytes): 0 211 * key material length (4 bytes) 265 * version (4 bytes): 0. 271 * key material length (4 bytes). 289 * unused (2 bytes) 324 * version (4 bytes): 0. 415 * version (4 bytes): 0. [all …]
|
| /lib/ |
| A D | string.c | 748 static void *check_bytes8(const u8 *start, u8 value, unsigned int bytes) in check_bytes8() argument 750 while (bytes) { in check_bytes8() 754 bytes--; in check_bytes8() 767 void *memchr_inv(const void *start, int c, size_t bytes) in memchr_inv() argument 773 if (bytes <= 16) in memchr_inv() 774 return check_bytes8(start, value, bytes); in memchr_inv() 790 bytes -= prefix; in memchr_inv() 793 words = bytes / 8; in memchr_inv() 802 return check_bytes8(start, value, bytes % 8); in memchr_inv()
|
| A D | tables_csum.c | 10 const u8 *bytes = v; in table_compute_checksum() local 15 checksum -= bytes[i]; in table_compute_checksum()
|
| /lib/lzma/ |
| A D | lzma.txt | 191 The maximum value for dictionary size is 1 GB = 2^30 bytes. 192 Dictionary size is calculated as DictionarySize = 2^N bytes. 194 size D = 2^N you need about D bytes of memory (RAM). 196 -fb{N}: set number of fast bytes - [5, 273], default: 128 205 equal 2^N. For example, for 32-bit (4 bytes) 326 larger than 200-400 bytes. 369 propData - LZMA properties (5 bytes) 370 propSize - size of propData buffer (5 bytes) 372 LZMA_FINISH_ANY - Decode just destLen bytes. 391 SZ_ERROR_INPUT_EOF - It needs more bytes in input buffer (src). [all …]
|